International Journal of
Computer Engineering Research

  • Abbreviation: Int. J. Comput. Eng. Res.
  • Language: English
  • ISSN: 2141-6494
  • DOI: 10.5897/IJCER
  • Start Year: 2010

IJCER Articles

July 2017

Framework for integrating fragmented information systems: Case of livestock information systems

Information System (IS) is used for information communication. But the problem with the existing Agro-ISs is that they are not integrated. To integrate it, we need to have an integration framework. Generally, much has been done on the designing framework for IS integration. However, there are credible things which can be added to improve these frameworks. A framework can be designed in such a way that it guides users on...

Author(s): Abswaidi Ramadhani, Anael Sam and Khamisi Kalegele

May 2016

In silico study in mitochondrial and chloroplast genomes of plants

Simple sequence repeats (SSRs) or microsatellites constitute a countable portion of genomes. However, the significance of SSRs in organelle genomes has not been completely understood. The availability of organelle genome sequences allows us to understand the organization of SSRs in their genic and intergenic regions. In the current study, the mitochondrial and chloroplast genomes of different taxa of plants were...

Author(s): G. V. Padma Raju, P. Srinivasa Rao, V. Chandra Sekhar and C. Someswara Rao

February 2016

Issues in a transactional database emanating from data warehouse project

When a data warehouse (DW) is built, typical extraction, transformation, and loading operations are made, including cleaning tasks of the data, conflicts resolution, inconsistencies identification, and constrains checking, among others. In this work, two databases (DB) were combined to obtain indexes approved and failing course in basic sciences area (Mathematics, Physics, Chemistry) of the Institute of Technology of...

Author(s): José A. Z. M., Beatriz R. R., Hugo de la R. C. and Patricia R. A.

October 2014

Real-time operating system (RTOS) with application to play models

It is very important to improve the design of the real-time operating system (RTOS) especially if we want to use it in some special devices. Numerous researches have accepted conventional RTOS as being the customary approach for designing devices used by children. This is because these are able to facilitate the implementation different criteria such as clustering, stability and alternate programs. In this paper,...

Author(s): Hiba Shahid, Wadee Alhalabi and John Reif

July 2014

The comparison of time division multiple access (TDMA) (global system for mobile communication, GSM) and wideband-code division multiple access (W-CDMA) (third generation, 3G) system based on their modulation techniques

Mobile network communication system offers the users with seamless communication and this has caused wireless communication to increasingly become the preferred method of carrying multimedia traffic or messages such as voice, video, images, and data files. Time division multiple access (TDMA) is the multiple access scheme used in global system for mobile communication (GSM), while third generation (3G) system uses...

Author(s): Olusanya Olamide O. and Ogunseye Abiodun A.

November 2012

An open source Geographic Information System (GIS) approach to water supply management, distribution and billing

  In this work a comprehensive solution for the Gatanga Water Trust (GWT) has been developed to assist it in managing its water supply and distribution. The solution comprises two subcomponents: a mapping component and a billing component which are tightly coupled together. The proposed system uses stable open source products for the mapping component and the database. At present the GWT uses outdated maps and...

Author(s): David Ndegwa Kuria, Douglas Engoke Musiega, Moses Murimi Ngigi and Simon Kibue Ngugi

November 2012

Simulation analysis of proactive, reactive and hybrid routing protocols in mobile ad hoc network using Qualnet simulator 5.0.2

  Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network. All nodes are mobile and can be connected dynamically in an arbitrary manner. There is no static infrastructure such as base station. All nodes of these networks behave as routers and take part in discovery...

Author(s): Nitin Arora and Suresh Kumar

May 2012

New Holder-type inequalities for the Tracy-Singh and Khatri-Rao products of positive matrices

  Recently, authors established a number of inequalities involving Khatri-Rao product of two positive matrices. Here, in this paper, the results are established in three ways. First, we find new Holder-type inequalities for Tracy-Singh and Khatri-Rao products of positive semi-definite matrices. Secondly, the results are extended to provide estimates of sums of the Khatri-Rao and Tracy-Singh products of any...

Author(s): Zeyad AL-Zhour

May 2012

Design and simulation of an SMS driven microcontroller for home automation using proteus software

  Technology has moved from a level at which a user is always present in a place before he/she can control or do anything at the place. Imagine what television used to be before the inception of remote control. With the inception of remote control, the television can be controlled while lying on the bed or sitting down on the chair. You do not have to move towards it and press the button on it before you can...

Author(s): Olusanya O. Olamide and Ayeni O. A. Joshua

April 2012

Predicting shelf life of dairy product by using artificial neural networks (ANN) and statistical computerized methods

Artificial neural networks (ANN) have been developed as generalizations of mathematical models of biological nervous systems. Generalized regression (GR) and multiple linear regression (MLR) models for shelf life prediction of dairy product were developed. Results of both the models were evaluated with three types of prediction performance measures viz., mean square error, root mean square error and...

Author(s): Sumit Goyal and Gyanendra Kumar Goyal

April 2012

High performance efficiency of distributed optical fiber Raman amplifiers for different pumping configurations in different fiber cable schemes

  Fiber Raman amplifiers (FRAs) are attractive for ultra wide dense wavelength division multiplexing (UW-DWDM) transmission systems due to their advantages of broad amplification bandwidth and flexible central wavelength. With recent developments of optical pump sources with high power near 1.4 μm wavelength and highly nonlinear fiber having a peak effective Raman gain coefficient, more than ten times that...

Author(s): Abd El–Naser A. Mohamed, Ahmed Nabih Zaki Rashed and Mahmoud M. A. Eid

January 2012

A review on advances in iris recognition methods

Iris recognition is one of the most accurate identity verification systems. Since its initial introduction by J. Daughman, many methods have been proposed to enhance the performance. We present an overview of the latest research on iris recognition by categorizing the research in four groups outlined as localization, segmentation, coding and recognition. We present the latest developments explaining advances to solve...

Author(s): Fuad .M. Alkoot

January 2012

Fast matrix multiplication techniques based on the Adleman-Lipton model

  On distributed memory electronic computers, the implementation and association of fast parallel matrix multiplication algorithms has yielded astounding results and insights. In this discourse, we use the tools of molecular biology to demonstrate the theoretical encoding of Strassen’s fast matrix multiplication algorithm with DNA based on an n-moduli set in the residue number system, thereby...

Author(s): Aran Nayebi

November 2011

Cross layer based miss detection ratio under variable rate for intrusion detection in WLAN

The emphasis for the use of wireless LAN in industry is on robustness, reliability and security. Almost any given single secruity mechanism (such as MAC filtering) alone may be easily overcome by attackers. However, proper configuration and implemetation of the maximum possible security mechanism must be used to form a multiple security layers, to provide the best possible wireless protection. The present paper...

Author(s): Ravneet Kaur

November 2011

Managing distribution of national examinations using geospatial technologies: A case study of Pumwani and Central divisions

Author(s): David Ndegwa Kuria, Moses Murimi Ngigi, Josephine Wanjiru Wanjiku and Rachel Kavutha Kasumuni

October 2011

A study of indoor positioning by using trigonometric and weight centroid localization techniques

An indoor positioning system was developed to provide a fast and easy determination of unknown position coordinates. Wireless sensor nodes (WSN) are employed in a test area. Trigonometry techniques were employed to determine the position of the unknown objects by employing numerical analysis techniques on received signal link quality indicator (LQI) values. The distances between the unknown object position and the WSNs...

Author(s): Hakan Koyuncu and Shuang Hua Yang

  • Article Number: 93261F58491

October 2011

A least square approach to analyze usage data for effective web personalization

Web server logs have abundant information about the nature of users accessing it. The analysis of the user’s current interest based on the navigational behavior may help the organizations to guide the users in their browsing activity and obtain relevant information in a shorter span of time (Sumathi and Padmaja, 2010). Web usage mining is used to discover interesting user navigation patterns and can be applied to...

Author(s): S. S. Patil

  • Article Number: A2C5D2A8499

September 2011

Investigation in the deployment of a geographic information system

  After a presentation of the cereal activities in Tunisia, we present a systemic analysis of project of deployment of a geographic information system (GIS). This analysis is based on the objective oriented project planning (OOPP) method. The exploitation of the systemic analysis method enables us not only to analysis and to identify the information of the cereal activities but also to lead to an efficient...

Author(s): M. N. Lakhoua

  • Article Number: DA0CC098444

April 2011

A shift-add algorithm for computing Bezier curves

  A shift-add algorithm based on coordinate rotation digital computer algorithm for computing Bezier curves was presented in this paper. This algorithm can be implemented in basic computing system (which deals only with shift, add and logical operations) which exists in many areas. Convergence of the algorithm was proved. Error estimation was analyzed. A numerical experiment was carried out to validate...

Author(s): GU  Feng

  • Article Number: 0A082B48458

March 2011

Towards auto-configuring routing protocols for wireless ad-hoc networks

  The importance of wireless ad-hoc networks in community and commercial connectivity cannot be underestimated because of the benefits associated with these networks. Self-organization will minimize the need for manual configuration. In essence, self-organization provides an out-of-the-box functionality such that very little technical expertise is required to setup a network. Providing unique IP addresses...

Author(s): M. B. Mutanga, P. Mudali and M. O. Adigun

  • Article Number: 07355788323

March 2011

Hidden markov model based Arabic morphological analyzer

  Natural language processing tasks includes summarization, machine translation, question understanding, part of speech tagging, etc. In order to achieve those tasks, a proper language representation must be defined. Roots and stems are considered as representations for some of those systems. A word needs to be processed to extract its root or stem. This paper presents a new technique that extracts word...

Author(s): A. F. Alajmi, E. M. Saad and M. H. Awadalla

  • Article Number: 86693C28341

March 2011

Efficient power savings in wireless sensor networks with network coding and overhearing avoidance

Author(s): Hnin Yu Shwe and Xiaohong Jiang

  • Article Number: F3A445D8413

February 2011

Blind signal separation based on generalized Laplace distribution

Blind Signal Separation is the task of separating signals when only their mixtures are observed. Recently, Independent Component Analysis has become a favorite method of researchers for attacking this problem. We propose a new score function based on Generalized Laplace Distribution for the problem of blind signal separation for supergaussian and subgaussian. To estimate the parameters of such score function we used...

Author(s): M. EL-Sayed Waheed, Osama Abdo Mohamed and M. E. Abd El-Aziz

  • Article Number: 08452468212

February 2011

Quality of service constrained task mapping and scheduling algorithm for wireless sensor networks

Blind Signal Separation is the task of separating signals when only their mixtures are observed. Recently, Independent Component Analysis has become a favorite method of researchers for attacking this problem. We propose a new score function based on Generalized Laplace Distribution for the problem of blind signal separation for supergaussian and subgaussian. To estimate the parameters of such score function we used...

Author(s): Medhat H. A. Awadalla and Rania R. Darwish

  • Article Number: 0430F558263

April 2010

A survey of agent-oriented software engineering paradigm: Towards its industrial acceptance

Agent-oriented software engineering (AOSE) paradigm represents an interesting means of analyzing, designing and building complex software systems quite suitable to new software development requirements. Many scientific researches have been focused on this paradigm, yet its current state still reports relative lack of industrial acceptance compared to others. As a survey of AOSE paradigm, this paper outlines the overall...

Author(s): O. Zohreh Akbari

  • Article Number: FE0BEB08074

April 2010

Optimized mask selection for person identification and camera distance measurement based on interocular distance

This paper presents a multi-resolution masks based pattern matching method for person identification. The system is commenced with the construction of multi-resolution mask cluster pyramid, where the mask size is chosen depending on the distance between two eyes, computed from the detected face. Experimental results show the effectiveness of the system with significantly higher precision, recall rates and matching...

Author(s): Khandaker Abir Rahman, Shafaeat Hossain, Al-Amin Bhuiyan, Tao Zhang, Md. Hasanuzzaman and H. Ueno

  • Article Number: 30383CD8113

March 2010

Using the OOPP method to analyze complex industrial systems

The aim of this paper is to propose a methodology for the analysis and modeling of complex industrial systems and to validate it through a case study. In fact, an effective management of a complex industrial system can be only in systems whose activities are synchronized and enabling a good traceability. The development of a reliable Information System (IS) is primordial. The methodology is divided into five steps and...

Author(s): Mohamed Najeh Lakhoua, and Taieb Ben Jouida,

  • Article Number: D8435B28011

March 2010

Modelling and simulation of electrical machines on the basis of experimental frequency response characteristics

The mathematical models of the Asynchronous electrical machines developed on the basis of the experimental frequency-response characteristics are proposed in this paper. The latter ones are recommended for investigating the transient processes occurring at short-circuits and connections of the electrical machines to the bus bars of electrical system taking into account of their rotor speed changes.   Key...

Author(s): Abdesslem Lamari

  • Article Number: F7343C18032

Page 1 of 1, showing 28 records out of 28 total, starting on record 1, ending on 28